fullrecord |
[{"key": "dc.contributor.advisor", "value": "Siponen, Mikko", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Kannisto, Leo", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Mattila, Petri", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2017-11-21T15:08:46Z", "language": "", "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2017-11-21T15:08:46Z", "language": "", "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2017", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.other", "value": "oai:jykdok.linneanet.fi:1802824", "language": null, "element": "identifier", "qualifier": "other", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/55967", "language": "", "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 on pro gradu -tutkielma aiheesta \u201dkuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin\u201d. T\u00e4m\u00e4 tutkimus pyrkii selvitt\u00e4m\u00e4\u00e4n kuluttajien suhtautumista mobiililaitteidensa tietoturvakysymyksiin \u2013 etenkin siihen, miksi kuluttajat eiv\u00e4t k\u00e4yt\u00e4 tietoturvasovelluksia mobiililaitteillaan. T\u00e4ss\u00e4 tutkielmassa mobiililaitteista tarkastellaan \u00e4lypuhelimia ja tabletteja. Tutkielman kirjallisuuskatsausosio esittelee tutkimuksen keskeiset aiheet: tietoturvan ja tietoturvauhkat mobiililaitekontekstissa sek\u00e4 Rogersin (1975, 1983) suojelumotivaatioteorian, jonka ohella esitell\u00e4\u00e4n suojelumotivaatioteoriaa hy\u00f6dynt\u00e4neit\u00e4 aiempia tietoturva-aiheisia tutkimuksia. Teimme kvalitatiivisen tutkimuksen haastattelemalla suomalaisia mobiililaitteiden kuluttajak\u00e4ytt\u00e4ji\u00e4 heid\u00e4n tietoturvak\u00e4ytt\u00e4ytymisest\u00e4\u00e4n. Tutkimuksen tuloksena selvisi, ett\u00e4 tietoturvasovellusten k\u00e4ytt\u00f6\u00f6n ja k\u00e4ytt\u00f6aikeisiin sek\u00e4 k\u00e4ytt\u00e4m\u00e4tt\u00f6myyteen voidaan n\u00e4hd\u00e4 vaikuttavan suuri osa suojelumotivaatioteorian k\u00e4sitteist\u00e4. Erityisesti tietoturvasovellusten k\u00e4ytt\u00e4m\u00e4tt\u00f6myytt\u00e4 selitt\u00e4v\u00e4t k\u00e4sitteet koettu haavoittuvuus uhkalle sek\u00e4 vastareaktion kustannukset.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Consumers' attitudes concerning mobile device data security threats.\r\n\r\nThis is a master\u2019s thesis on consumer attitudes towards mobile device data security threats. The purpose of this thesis is to examine why consumers do not use data security applications on their mobile devices \u2013 specifically smartphones and tablets in the thesis\u2019 context. The literature review covers the topics of data security and data security threats and protection motivation theory (PMT) by Rogers (1975, 1983), and the use of PMT in other earlier studies regarding data security. We conducted a qualitative study by interviewing Finnish mobile device consumers and their data security behaviour. As a result, we found that the use of, the intentions to use and to not use data security applications is affected by most of the constructs of PMT. Vulnerability and response costs are the core constructs for not using data security applications on mobile devices.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Leo Kannisto (leolkann) on 2017-11-21 15:08:45.962307. Form: Pro gradu -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/pro-gradu-lomake). JyX data: [jyx_publishing-allowed (fi) =False]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2017-11-21T15:08:46Z\r\nNo. of bitstreams: 2\r\nURN:NBN:fi:jyu-201711214324.pdf: 932154 bytes, checksum: 581052bae073222dca4a5470434b6c0b (MD5)\r\nlicense.html: 1151 bytes, checksum: 66012aae308cec0bf556d14ea4785372 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2017-11-21T15:08:46Z (GMT). No. of bitstreams: 2\r\nURN:NBN:fi:jyu-201711214324.pdf: 932154 bytes, checksum: 581052bae073222dca4a5470434b6c0b (MD5)\r\nlicense.html: 1151 bytes, checksum: 66012aae308cec0bf556d14ea4785372 (MD5)\r\n Previous issue date: 2017", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "1 verkkoaineisto (95 sivua)", "language": null, "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.format.mimetype", "value": "application/pdf", "language": null, "element": "format", "qualifier": "mimetype", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "suojelumotivaatioteoria", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "mobile data security", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "data security threat", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "smartphone", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "protection motivation theory", "language": null, "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Kuluttajien suhtautuminen mobiililaitteiden tietoturvauhkiin", "language": null, "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "master thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201711214324", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Master\u2019s thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Pro gradu -tutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.method", "value": "Kvalitatiivinen tutkimus", "language": null, "element": "subject", "qualifier": "method", "schema": "dc"}, {"key": "dc.date.updated", "value": "2017-11-21T15:08:46Z", "language": "", "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_bdcc", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "restrictedAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "masterThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": null, "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "tietoturva", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "uhat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "mobiililaitteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "\u00e4lypuhelimet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "taulutietokoneet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "kuluttajat", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "asenteet", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.format.content", "value": "fulltext", "language": null, "element": "format", "qualifier": "content", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "This material has a restricted access due to copyright reasons. It can be read at the workstation at Jyv\u00e4skyl\u00e4 University Library reserved for the use of archival materials: https://kirjasto.jyu.fi/en/workspaces/facilities.", "language": "en", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.rights.accessrights", "value": "Aineistoon p\u00e4\u00e4sy\u00e4 on rajoitettu tekij\u00e4noikeussyist\u00e4. Aineisto on luettavissa Jyv\u00e4skyl\u00e4n yliopiston kirjaston arkistoty\u00f6asemalta. Ks. https://kirjasto.jyu.fi/fi/tyoskentelytilat/laitteet-ja-tilat.", "language": "fi", "element": "rights", "qualifier": "accessrights", "schema": "dc"}, {"key": "dc.type.okm", "value": "G2", "language": null, "element": "type", "qualifier": "okm", "schema": "dc"}]
|